Skip to content

Advertisement

Articles

Page 2 of 2

  1. Content type: Research

    One of the main challenges in cross-border disaster management is the development and use of information systems that cater the needs of heterogeneous relief agencies, policies, activities and cultures. Drawin...

    Authors: Nitesh Bharosa, JinKyu Lee, Marijn Janssen and H Raghav Rao

    Citation: Security Informatics 2012 1:15

    Published on:

  2. Content type: Research

    Analysts who use predictive analytics methods need actionable evidence to support their models and simulations. Commonly, this evidence is distilled from large data sets with significant amount of culling and ...

    Authors: Michael C Madison, Andrew J Cowell, R Scott Butner, Keith Fligg, Andrew W Piatt, Liam R McGrath and Peter C Ellis

    Citation: Security Informatics 2012 1:10

    Published on:

  3. Content type: Case study

    This paper reports an exploratory research on the distribution of event complexity in the British Columbia court system. Analysis of event distribution shows that the frequency of events sharply decreases with...

    Authors: Amir H Ghaseminejad, Paul Brantingham and Patricia Brantingham

    Citation: Security Informatics 2012 1:13

    Published on:

  4. Content type: Research

    Our most significant security challenges involve people. While human behavior has long been studied, computational modeling of human behavior is early in its development. An inherent challenge in modeling of h...

    Authors: Roderick M Riensche and Paul D Whitney

    Citation: Security Informatics 2012 1:11

    Published on:

  5. Content type: Research

    In this paper we address the problem of testing complex computer models for infrastructure protection and emergency response based on detailed and realistic application scenarios using advanced computational m...

    Authors: Hamed Yaghoubi Shahir, Uwe Glässer, Roozbeh Farahbod, Piper Jackson and Hans Wehn

    Citation: Security Informatics 2012 1:4

    Published on:

  6. Content type: Research

    Law enforcement agencies monitor criminal incidents. With additional geographic and demographic data, law enforcement analysts look for spatio-temporal patterns in these incidents in order to predict future cr...

    Authors: Xiaofeng Wang and Donald E Brown

    Citation: Security Informatics 2012 1:2

    Published on:

  7. Content type: Research

    Collaborative information systems (CIS) enable users to coordinate efficiently over shared tasks in complex distributed environments. For flexibility, they provide users with broad access privileges, which, as...

    Authors: You Chen, Steve Nyemba, Wen Zhang and Bradley Malin

    Citation: Security Informatics 2012 1:5

    Published on:

  8. Content type: Research

    In previous studies classification algorithms were employed successfully for the detection of unknown malicious code. Most of these studies extracted features based on byte n-gram patterns in order to represent t...

    Authors: Asaf Shabtai, Robert Moskovitch, Clint Feher, Shlomi Dolev and Yuval Elovici

    Citation: Security Informatics 2012 1:1

    Published on:

2016 Journal Metrics

  • Speed
    24 days from submission to first decision
    14 days from acceptance to publication

    Usage 
    46,792 downloads
    1912.0 Usage Factor

    Social Media Impact
    12 mentions

Advertisement